We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Enhancing Security of Cloud Computing using Elliptic Curve Cryptography

by Abhuday Tripathi, Parul Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 1
Year of Publication: 2012
Authors: Abhuday Tripathi, Parul Yadav
10.5120/9078-1418

Abhuday Tripathi, Parul Yadav . Enhancing Security of Cloud Computing using Elliptic Curve Cryptography. International Journal of Computer Applications. 57, 1 ( November 2012), 26-30. DOI=10.5120/9078-1418

@article{ 10.5120/9078-1418,
author = { Abhuday Tripathi, Parul Yadav },
title = { Enhancing Security of Cloud Computing using Elliptic Curve Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 1 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number1/9078-1418/ },
doi = { 10.5120/9078-1418 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:20.044518+05:30
%A Abhuday Tripathi
%A Parul Yadav
%T Enhancing Security of Cloud Computing using Elliptic Curve Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 1
%P 26-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a form of distributed computing environment. It provides an environment where thousands of computers work in parallel to perform a job in much less times than traditional client server model. This parallelism happens because of low cost virtualization of hardware resources. Cloud computing abstracts the complexity of services provided to the user. In this article we have tried to explore various cloud computing model and how their security requirement differs from traditional computing model. We have analyzed various security risk associated with them, different ways to mitigate them and limitations of current cryptographic schemes. We have analyzed elliptic curve cryptographic schemes for cloud based applications in comparison to RSA based schemes. Here we have tried to give theoretical and experimental results to proof that elliptic curve based public key cryptography is far better than RSA based schemes. We have implemented ecdsa algorithm and compared its performance with RSA based algorithm in cloud. It supports our conclusion from the survey of cloud based applications.

References
  1. Peter Mell and Tim Grance. The NIST Definition of Cloud Computing, October 2009.
  2. Buyya, R. , Yeo, C. S. , Venugopal, S. , Broberg, J. , Bandic, I. : Cloud Computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer System 25(6), 599–616 (2009)
  3. Cloud Computing. http://en. wikipedia. org/wiki/Cloud_computing.
  4. Höfer, M. & Howanitz, G. The Client Side of Cloud Computing. Strategies 1-20 (2009). at http://www. embeddedcmmi. at/fileadmin/src/docs/teaching/SS09/SaI/Hoefer_Howanitz_Paper. pdf
  5. Jamil,Danish. Zaki ,Hassan. "Cloud Computing Security". In International Journal of Engineering Science and Technology. Vol. 3 No. 4April2011.
  6. Gens, F. New IDC IT Cloud Services Survey: Top Benefits and Challenges. In: IDC eXchange (2009), http://blogs. idc. com/ie/?p=730
  7. Narpat,S. Sekhawat et. al. " Cloud Computing Security through Cryptography for Banking Sector". In Proc. 2011 5th National Conference. INDIACom-2011
  8. Foster, Ian et al. "Cloud Computing and Grid Computing 360-Degree Compared. " 2008 Grid Computing Environments Workshop abs/0901. 0. 5 (2008) :1-10
  9. Dijk, Marten Van, and Ari Juels. "On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. " Computing 305 (2010): 1-8.
  10. Jensen, M. et al. , 2009. On Technical Security Issues in Cloud Computing. 2009 IEEE International Conference on Cloud Computing, 0(2009), p. 109-116. Available at: http://ieeexplore. ieee. org/lpdocs/epic03/wrapper. htm?arnumber=5284165.
  11. Miller, V. S. Use of elliptic curves in cryptography. Advances in Cryptology: Crypto 85, 417-426 (1986).
  12. N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48, pages 203–209, 1987.
  13. SEC 1 Elliptic curve cryptography. Certicom Research. September 20 2000.
  14. Legion of the BouncyCastle, Bouncycastle, www. bouncycastle. org
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing network security cryptography